Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
privacy-enhancing techniques such as secure multi-party computation, homomorphic encryption, differential privacy, and trusted execution to design algorithms and protocols to secure ML models within
-
for the prediction task, such as predicting the bioassay of a given chemical network. One of the approaches that will be considered will be the Bayesian information-theoretic Minimum Message Length (MML) principle
Searches related to theoretical computer science
Enter an email to receive alerts for theoretical-computer-science positions